Post

IML - Radare2 Reverse Engineering: Ep.2 – Windows Binary Part 2

Radare2 Reverse Engineering Ep.2 - A walkthrough of the challenge with enumeration, exploitation and privilege escalation steps.



IML - Radare2 Reverse Engineering: Ep.2 – Windows Binary Part 2

  • We can read all the strings in the binary with:
1
2
izz

image1

or to be more precise - we can do:

1
2
izz~password

image2

  • And we get the password:
    the_password_token

  • Now if we take the address of the password - we can print out a block starting at that position:

image3

And we get the address of the 7th character

  • To get the password compare function we can do:
1
2
f | grep "pass"

image4

This post is licensed under CC BY 4.0 by the author.